Accepted Regular Papers
5 Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang and Daren Zha. EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients
7 Qianying Zhang, Shijun Zhao and Dengguo Feng. Improving the Security of the HMQV Protocol using Tamper-Proof Hardware
10 Jialong Zhang, Jayant Notani and Guofei Gu. Characterizing Google Hacking: A First Large-Scale Quantitative Study
19 Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen and Guofei Gu. Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-on Cross Site Scripting Attacks
21 Tilo Müller and Christopher Kugler. SCADS: Separated Control- and Data-Stack
22 Ziyu Wang and Jiahai Yang. A New Anomaly Detection Method Based on IGTE and IGFE
23 Byungho Min and Vijay Varadharajan. A Simple and Novel Technique for Counteracting Exploit Kits
29 Xiaoyan Sun, Jun Dai, Anoop Singhal and Peng Liu. Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks
33 Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li. Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy
42 Duohe Ma. Defending Blind DDoS Attack on SDN Based on Moving Target Defense
45 Issa Khalil, Zuochao Dou and Abdallah Khreishah. TPM-based Authentication Mechanism for Apache Hadoop
49 Max Suraev. Implementing an affordable and effective GSM IMSI catcher with 3G authentication
51 Tayyaba Zeb, Abdul Ghafoor, Awais Shibli and Muhammad Yousaf. A Secure Architecture for Inter-Cloud Virtual Machine Migration
52 Nicolas Van Balen and Haining Wang. GridMap: Enhanced Security in Cued-Recall Graphical Passwords
58 Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang and Justin Zhan. An Information-Theoretic Approach for Secure Protocol Composition
61 Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao and Chunfu Jia. Control Flow Obfuscation using Neural Network to Fight Concolic Testing
68 Qinglong Zhang, Zongbin Liu, Quanwei Cai and Ji Xiang. TST:A New Randomness Test Method Based on Golden Distribution
70 Sarmad Ullah Khan. An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
74 Shen Su and Beichuan Zhang. Detecting concurrent prefix hijack events online
75 Anna Squicciarini, Dan Lin, Smitha Sundareswaran and Jingwei Li. Policy Driven Node Selection in MapReduce
79 Vincenzo Gulisano, Magnus Almgren and Marina Papatriantafilou. METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures
80 Chen Cao, Yuqing Zhang, Qixu Liu and Kai Wang. Function Escalation Attack
83 Eirini Karapistoli, Panagiotis Sarigiannidis and Anastasios Economides. Wormhole Attack Detection in Wireless Sensor Networks based on Visual Analytics
89 Binh Vo and Steven Bellovin. Anonymous Publish-Subscribe Systems
91 Jeroen Massar, Ian Mason, Linda Briesemeister and Vinod Yegneswaran. JumpBox -- A Seamless Browser Proxy for Tor Pluggable Transports
93 Sushama Karumanchi, Jingwei Li and Anna Squicciarini. Securing Resource Discovery in Content Hosting Networks
95 Hugo Gonzalez, Natalia Stakhanova and Ali Ghorbani. DroidKin: Lightweight Detection of Android Apps Similarity
Accepted Short Papers
8 Yazhe Wang, Mingming Hu and Chen Li. UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts
15 Chengcheng Shao, Liang Chen, Shuo Fan and Xinwen Jiang. Social Authentication Identity: An Alternate to Internet Real Name System
16 Xi Xiao, Xianni Xiao, Yong Jiang and Qing Li. Detecting Mobile Malware with TMSVM
25 Yosra Ben Mustapha, Hervé Debar and Gregory Blanc. Policy Enforcement Point Model
27 Zhangjie Fu, Jiangang Shu, Xingming Sun and Naixue Xiong. An Effective Search Scheme based on Semantic Tree over Encrypted Cloud Data Supporting Verifiability
31 Pieter Burghouwt, Marcel E.M. Spruit and Henk J. Sips. Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations
37 Jingwei Li, Dan Lin, Anna Squicciarini and Chunfu Jia. STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds
38 Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State and Thomas Engel. RAMSES: Revealing Android Malware through String Extraction and Selection
48 Kan Chen, Peidong Zhu and Yueshan Xiong. Keep the Fakes Out: Defending against Sybil Attack in P2P systems
54 Zhang Lulu, Yongzheng Zhang and Tianning Zang. Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-coupled Payloads Filtering Scheme
72 Yuling Luo, Junxiu Liu, Jinjie Bi and Senhui Qiu. Hardware Implementation of Cryptographic Hash Function based on Spatiotemporal Chaos
81 Swarup Chandra, Zhiqiang Lin, Ashish Kundu and Latifur Khan. A Systematic Study of the Covert-Channel Attacks in Smartphones
86 Sami Zhioua, Adnene Ben Jabeur, Mahjoub Langar and Wael Ilahi. Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models
87 Eslam Abdallah, Mohammad Zulkernine and Hossam Hassanein. Countermeasures for Mitigating ICN Routing Related DDoS Attacks
90 Ding Wang and Ping Wang. On the Usability of Two-Factor Authentication
94 Bhaswati Deka, Ryan Gerdes, Ming Li and Kevin Heaslip. Friendly Jamming for Secure Localization in Vehicular Transportation
97 Wenjun Fan. Catering Honeypots Creating Based on the Predefined Honeypot Context